Jin Cao

According to our database1, Jin Cao authored at least 70 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A neural mechanism of direct and observational conditioning for placebo and nocebo responses.
NeuroImage, 2019

2018
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.
Security and Communication Networks, 2018

EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks.
J. Network and Computer Applications, 2018

A unified clustering approach for identifying functional zones in suburban and urban areas.
Proceedings of the IEEE INFOCOM 2018, 2018

2017
A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks.
Wireless Personal Communications, 2017

G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks.
IEEE Trans. Vehicular Technology, 2017

An Automata Based Intrusion Detection Method for Internet of Things.
Mobile Information Systems, 2017

A secure SDN based multi-RANs architecture for future 5G networks.
Computers & Security, 2017

Uncalibrated peg-hole alignment using visual servoing.
Proceedings of the 2017 IEEE International Conference on Real-time Computing and Robotics, 2017

Statistical network behavior based threat detection.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Extracting mobile user behavioral similarity via cell-level location trace.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Computing road signatures from cell sequences with minimum inconsistencies.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Online activities categorization of mobile users.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

2015
GBAAM: group-based access authentication for MTC in LTE networks.
Security and Communication Networks, 2015

A fast gene selection method for multi-cancer classification using multiple support vector data description.
Journal of Biomedical Informatics, 2015

A novel group access authentication and key agreement protocol for machine-type communication.
Trans. Emerging Telecommunications Technologies, 2015

UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Access Authentication of Mass Device Connections for MTC in LTE Networks.
Smart CR, 2014

Group-based authentication and key agreement for machine-type communication.
IJGUC, 2014

Sparse signal recovery with unknown signal sparsity.
EURASIP J. Adv. Sig. Proc., 2014

A Survey on Security Aspects for LTE and LTE-A Networks.
IEEE Communications Surveys and Tutorials, 2014

Enterprise Social Networking Data Analytics Within Alcatel-Lucent.
Bell Labs Technical Journal, 2014

A Multi-Layer Dynamic Model for Customer Experience Analytics.
Bell Labs Technical Journal, 2014

An Automatic Counting Method of Maize Ear Grain Based on Image Processing.
Proceedings of the Computer and Computing Technologies in Agriculture VIII, 2014

2013
A New Roaming Authentication Framework For Wireless Communication.
TIIS, 2013

A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card.
TIIS, 2013

Enterprise social network analysis and modeling: A tale of two graphs.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Integrated capacity allocation policies for a production service system with two-class customers and items.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

2012
An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks.
IEEE Trans. Wireless Communications, 2012

Security Issues on Machine to Machine Communications.
TIIS, 2012

An efficient MAC scheme for secure network coding with probabilistic detection.
Frontiers Comput. Sci., 2012

A simple and robust handover authentication between HeNB and eNB in LTE networks.
Computer Networks, 2012

Dynamic Group Based Authentication Protocol for Machine Type Communications.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A lightweight roaming authentication protocol for anonymous wireless communication.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Unified handover authentication between heterogeneous access systems in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A group-based authentication and key agreement for MTC in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A Mixed Multi-tenancy Data Model and Its Migration Approach for the SaaS Application.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

2011
Modeling time correlation in passive network loss tomography.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Sequential hashing: A flexible approach for unveiling significant patterns in high speed networks.
Computer Networks, 2010

Tracking Long Duration Flows in Network Traffic.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Tracking Quantiles of Network Data Streams with Dynamic Operations.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Identifying suspicious activities through DNS failure graph analysis.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

2009
Tracking Cardinality Distributions in Network Traffic.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Monitoring Time-Varying Network Streams Using State-Space Models.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Distinct Counting with a Self-Learning Bitmap.
Proceedings of the 25th International Conference on Data Engineering, 2009

2008
Traffic recovery time constrained shared sub-path protection algorithm in survivable WDM networks.
Computer Networks, 2008

Intuitive network applications: Learning user context and behavior.
Bell Labs Technical Journal, 2008

Estimating cardinality distributions in network traffic: extended abstract.
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008

Mobile User Profile Acquisition through Network Observables and Explicit User Queries.
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), 2008

A Quasi-Likelihood Approach for Accurate Traffic Matrix Estimation in a High Speed Network.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Shared Sub-Path Protection Algorithm with Recovery Time Constraint in WDM Networks.
Proceedings of the Fourth International Conference on Networking and Services, 2008

Online Identification of Applications Using Statistical Behavior Analysis.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
A new shared-risk link groups (SRLG)-disjoint path provisioning with shared protection in WDM optical networks.
J. Network and Computer Applications, 2007

A novel recursive shared segment protection algorithm in survivable WDM networks.
J. Network and Computer Applications, 2007

Optical Communications New and enhanced protection scheme in survivable meshed WDM optical networks.
European Transactions on Telecommunications, 2007

Highly efficient styrylamine-doped blue and white organic electroluminescent devices.
Displays, 2007

Spectral studies of white organic light-emitting devices based on multi-emitting layers.
Displays, 2007

A Simple and Efficient Estimation Method for Stream Expression Cardinalities.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Network Tomography: Identifiability and Fourier Domain Estimation.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

A Fast and Compact Method for Unveiling Significant Patterns in High Speed Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
Enhancement of red organic light-emitting diodes via cascade energy transfer.
Microelectronics Journal, 2006

Dynamic survivable routing heuristic for shared protected WDM optical networks.
IEEE Communications Letters, 2006

Nonlinear 3-D Motion Simulation Using Multi-Sensor Data Fusion.
Proceedings of the 2006 International Conference on Modeling, 2006

Measuring Human Satisfaction in Data Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Dynamic Path Shared Protection for Survivable Differentiated Reliable WDM Optical Networks.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

2004
Stochastic Models for Generating Synthetic HTTP Source Traffic.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

2002
A Poisson Limit for Buffer Overflow Probabilities.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

2001
On the nonstationarity of Internet traffic.
Proceedings of the Joint International Conference on Measurements and Modeling of Computer Systems, 2001


  Loading...